A method and system for propagation of myocardial infarction from delayed enhanced magnetic resonance imaging (DE-MRI) to cine MRI is disclosed. A reference frame is selected in a cine MRI sequence. deformation fields are calculated within the cine MRI sequence to register the frames of the cine MRI sequence to the reference frame. A DE-MRI image having an infarction region is registered to the reference frame of the cine MRI sequence. The DE-MRI image may be registered to the infarction region using a hybrid registration algorithm that unifies both intensity and feature points into a single cost function. Infarction information in the DE-MRI image is then propagated cardiac phases of the frames in the cine MRI sequence based on the registration of the DE-MRI image to the reference frame and the plurality of deformation fields calculated within the cine MRI sequence.
|
1. A method for propagating at least a portion of a static image over a cardiac cycle, comprising:
selecting a reference frame of a cine image sequence comprising a plurality of frames;
calculating a plurality of deformation fields within the cine image sequence to register the frames of the cine image sequence to the reference frame;
registering the static image to the reference frame of the cine image sequence; and
propagating at least a portion of the static image to a plurality of cardiac phases corresponding to the plurality of frames in the cine image sequence based on a deformation field resulting from registering the static image to the reference frame and the plurality of deformation fields calculated within the cine image sequence.
13. An apparatus for propagating at least a portion of static image over a cardiac cycle, comprising:
means for selecting a reference frame of a cine image sequence comprising a plurality of frames;
means for calculating a plurality of deformation fields within the cine image sequence to register the frames of the cine image sequence to the reference frame;
means for registering a static image to the reference frame of the cine image sequence; and
means for propagating at least a portion of the static image to a plurality of cardiac phases corresponding to the plurality of frames in the cine image sequence based on a deformation field resulting from registering the static image to the reference frame and the plurality of deformation fields calculated within the cine image sequence.
23. A non-transitory computer readable medium encoded with computer executable instructions for propagating at least a portion of a static image over a cardiac cycle, the computer executable instructions defining steps comprising:
selecting a reference frame of a cine image sequence comprising a plurality of frames;
calculating a plurality of deformation fields within the cine image sequence to register the frames of the cine image sequence to the reference frame;
registering a static image to the reference frame of the cine image sequence; and
propagating at least a portion of the static image to a plurality of cardiac phases corresponding to the plurality of frames in the cine image sequence based on a deformation field resulting from registering the static image to the reference frame and the plurality of deformation fields calculated within the cine image sequence.
2. The method of
selecting one of the plurality of frames in the cine image sequence that is most similar to the static image.
3. The method of
selecting one of the plurality of frames in the cine image sequence corresponding to a cardiac phase closest to a cardiac phase of the static image based on trigger times associated with the frames of the cine image sequence.
4. The method of
calculating a cross-correlation value between each frame of the cine image sequence and the static image; and
selecting the frame with the largest cross-correlation value as the reference frame.
5. The method of
registering each frame of the cine image sequence other than the reference frame to the reference frame using variational non-rigid registration with an inverse consistent constraint.
6. The method of
calculating a plurality of inverse consistent deformation fields to register the frames of the cine image sequence other than the reference frame to the reference frame.
7. The method of
registering the static image to the reference frame using a hybrid registration algorithm that unifies intensity-based and point-based similarity into a single cost function.
8. The method of
9. The method of
propagating the portion of the static image to a phase of the reference frame using the deformation field resulting from registering the static image to the reference frame; and
propagating the portion of the static image from the phase of the reference frame to a phase associated with each frame of the cine image sequence other than the reference frame using an inverse of a respective one of the plurality of deformation fields calculated within the cine image sequence.
10. The method of
deforming the static image using the deformation field resulting from registering the static image to the reference frame; and
propagating the deformed static image to a phase associated with each frame of the cine image sequence other than the reference frame using an inverse of a respective one of the plurality of deformation fields calculated within the cine image sequence.
11. The method of
deforming a delineated contour corresponding to a region of interest in the static image using the deformation field resulting from registering the static image to the reference frame; and
propagating the deformed contour to a phase associated with each frame of the cine image sequence other than the reference frame using an inverse of a respective one of the plurality of deformation fields calculated within the cine image sequence.
12. The method of
generating a region-of-interest in the reference frame by superimposing the portion of the static image onto the reference frame using the deformation field resulting from registering the static image to the reference frame; and
propagating the region-of-interest from the reference frame to each frame of the cine image sequence other than the reference frame using an inverse of a respective one of the plurality of deformation fields calculated within the cine image sequence.
14. The apparatus of
means for selecting one of the plurality of frames in the cine image sequence that is most similar to the static image.
15. The apparatus of
means for registering each frame of the cine image sequence other than the reference frame to the reference frame using variational non-rigid registration with an inverse consistent constraint.
16. The apparatus of
means for calculating a plurality of inverse consistent deformation fields to register the frames of the cine image sequence other than the reference frame to the reference frame.
17. The apparatus of
means for registering the static image to the reference frame using a hybrid registration algorithm that unifies intensity-based and point-based similarity into a single cost function.
18. The apparatus of
19. The apparatus of
means for propagating the portion of the static image to a phase of the reference frame using the deformation field resulting from registering the static image to the reference frame; and
means for propagating the portion of the static image from the phase of the reference frame to a phase associated with each frame of the cine image sequence other than the reference frame using an inverse of a respective one of the plurality of deformation fields calculated within the cine image sequence.
20. The apparatus of
means for deforming the static image using the deformation field resulting from registering the static image to the reference frame; and
means for propagating the deformed static image to a phase associated with each frame of the cine image sequence other than the reference frame using an inverse of a respective one of the plurality of deformation fields calculated within the cine image sequence.
21. The apparatus of
means for deforming a delineated contour corresponding to a region of interest in the static image using the deformation field resulting from registering the static image to the reference frame; and
means for propagating the deformed contour to a phase associated with each frame of the cine image sequence other than the reference frame using an inverse of a respective one of the plurality of deformation fields calculated within the cine image sequence.
22. The apparatus of
means for generating a region-of-interest in the reference frame by superimposing the portion of the static image onto the reference frame using the deformation field resulting from registering the static image to the reference frame; and
means for propagating the region-of-interest from the reference frame to each frame of the cine image sequence other than the reference frame using an inverse of a respective one of the plurality of deformation fields calculated within the cine image sequence.
24. The non-transitory computer readable medium of
selecting one of the plurality of frames in the cine image sequence that is most similar to the static image.
25. The non-transitory computer readable medium of
registering each frame of the cine image sequence other than the reference frame to the reference frame using variational non-rigid registration with an inverse consistent constraint.
26. The non-transitory computer readable medium of
calculating a plurality of inverse consistent deformation fields to register the frames of the cine image sequence other than the reference frame to the reference frame.
27. The non-transitory computer readable medium of
registering the static image to the reference frame using a hybrid registration algorithm that unifies intensity-based and point-based similarity into a single cost function.
28. The non-transitory computer readable medium of
29. The non-transitory computer readable medium of
propagating the portion of the static image to a phase of the reference frame using the deformation field resulting from registering the static image to the reference frame; and
propagating the portion of the static image from the phase of the reference frame to a phase associated with each frame of the cine image sequence other than the reference frame using an inverse of a respective one of the plurality of deformation fields calculated within the cine image sequence.
30. The non-transitory computer readable medium of
deforming the static image using the deformation field resulting from registering the static image to the reference frame; and
propagating the deformed static image to a phase associated with each frame of the cine image sequence other than the reference frame using an inverse of a respective one of the plurality of deformation fields calculated within the cine image sequence.
31. The non-transitory computer readable medium of
deforming a delineated contour corresponding to a region of interest in the static image using the deformation field resulting from registering the static image to the reference frame; and
propagating the deformed contour to a phase associated with each frame of the cine image sequence other than the reference frame using an inverse of a respective one of the plurality of deformation fields calculated within the cine image sequence.
32. The non-transitory computer readable medium of
generating a region-of-interest in the reference frame by superimposing the portion of the static image onto the reference frame using the deformation field resulting from registering the static image to the reference frame; and
propagating the region-of-interest from the reference frame to each frame of the cine image sequence other than the reference frame using an inverse of a respective one of the plurality of deformation fields calculated within the cine image sequence.
|
This application claims the benefit of U.S. Provisional Application No. 61/413,606, filed Nov. 15, 2010, the disclosure of which is herein incorporated by reference.
The present invention relates to cardiac imaging, and more particularly, to propagation of myocardial infarction from delayed enhanced cardiac imaging to cine magnetic resonance imaging.
Cardiac magnetic resonance imaging (MRI) has been proven effective for determining patient-specific myocardial motion and functional information using cine imaging, as well as for detection of myocardial infarction using delayed enhanced MRI (DE-MRI). Recent studies have compared myocardial tissue viability revealed in the DE-MRI to the functional deficits measured with cine MRI, showing the so-called “peri-infarction zone” defined in DE-MRI is correlated well with the dysfunctional myocardial region defined in cine. This information is potentially valuable for reperfusion therapy, as regional motion of an infarction zone defined before the therapy is assessed to evaluate the recovery of myocardium.
Although the clinical value of joint DE-MRI and cine image assessment is exhibited, standard clinical cardiac MR protocols typically acquire two sets of images across multiple measurements with variant imaging plane prescription and multiple breath-holdings. Misalignment and local deformation often appear between cine and DE-MRI, even if the imaging plane remains unchanged for two acquisitions by careful prescription, mainly due to inconsistent cardiac phases used for acquiring cine and DE-MRI, imperfect cardiac gating and respiratory motion. It is more problematic for patients with arrhythmias, as unstable cardiac cycles make it unreliable to identify the matching cine frame acquired in the same cardiac cycle as the DE-MRI.
Without an accurate mapping of the infarction zone to the cine images, regional myocardial changes in motion pattern caused by suspicious scars can only be visually assessed. Accordingly, accurate alignment and deformation correction between cine and DE-MRI can be advantageous for successful joint assessment, where one aim is to propagate the infarction delineated in a DE-MRI to all cine frames throughout the whole cardiac cycle and to enable quantitative regional motion pattern analysis of the infarction.
The present invention provides a method and system for propagation of a myocardial infarction from a DE-MRI image to cine MRI images. Embodiments of the present invention provide dedicated post-processing algorithms for aligning a DE-MRI image with a corresponding cine image and propagating a suspicious infarction zone from the DE-MRI image to all other cardiac phases. Infarction regions delineated in the DE-MRI image can be used to define a region of interest (ROI) for the quantification of regional abnormality of myocardial motion.
In one embodiment of the present invention, a reference frame is selected in a cine MRI sequence having a plurality of frames. A plurality of deformation fields are calculated within the cine MRI sequence to register other frames in the cine MRI sequence with the reference frame. A DE-MRI image is registered to the reference frame of the cine MRI sequence. Infarction information in the DE-MRI image is then propagated over all a plurality of cardiac phases corresponding to the frames of the cine MRI sequence based on a deformation field resulting from registering the DE-MRI image to the reference frame and the deformation fields calculated within the cine MRI sequence.
These and other advantages of the invention will be apparent to those of ordinary skill in the art by reference to the following detailed description and the accompanying drawings.
The present invention is directed to a method and system for propagation of myocardial infarction from delayed enhanced magnetic resonance imaging (DE-MRI) over a cardiac cycle using cine MRI. Embodiments of the present invention are described herein to give a visual understanding of the DE-MRI infarction propagation method. A digital image is often composed of digital representations of one or more objects (or shapes). The digital representation of an object is often described herein in terms of identifying and manipulating the objects. Such manipulations are virtual manipulations accomplished in the memory or other circuitry/hardware of a computer system. Accordingly, is to be understood that embodiments of the present invention may be performed within a computer system using data stored within the computer system.
Embodiments of the present invention provide align a DE-MRI image with a corresponding cine image and propagating a suspicious infarction zone from the DE-MRI image to all other cardiac phases of a cardiac cycle. Infarction regions delineated in the DE-MRI image can be used to define a region of interest (ROI) for the quantification of regional abnormality of myocardial motion. Embodiments of the present invention align the DE-MRI image to a cine image using a hybrid registration algorithm that unifies both intensity and feature points into one cost function. An intensity term is used to match two images on a coarse level, playing a role of regularization and dominating the alignment of normal myocardium, while a feature point term is robust against contrast changes between DE-MRI and cine, as in the cine images, the infarction zone bears little contrast as compared to normal myocardium and is largely invisible. The propagation of the infarction zone throughout the cine can be achieved by estimating myocardial deformation in the cine series using a variational non-rigid registration algorithm with inverse consistent constraint.
To align a DE-MRI image to a cine image and propagate suspicious infarction information, two types of deformation need to be estimated. The first corrects the mis-alignment between DE-MRI and cine and the second quantifies myocardial motion within the cine series.
As multiple cine images are required to cover an entire cardiac cycle, while DE-MRI image is usually acquired at a specific temporal phase, the cine image which is most similar to the DE-MRI image is selected as the reference frame ck to which the DE-MRI image is registered. Assuming that the k-th cardiac phase is the reference cine image ck, the deformation dk, from ck to the DE-MRI image E(pi) is determined by a hybrid image registration method, and both forward and inverse deformation fields dl, l=1 . . . n, l≠k are determined by a variational method. Once all of the deformation fields dl, l=1 . . . n are calculated, the DE-MRI and infarction region can be propagated.
At step 204, a cine MRI sequence is received. The DE-MRI image and the cine MRI sequence are of the same patient. The cine MRI sequence is a temporal sequence of multiple cardiac MRI images, each referred to as a “frame”. The cine MRI sequence can be received directly from an MR scanner. It is also possible that the cine MRI sequence can be received by loading a cine MRI sequence previously stored on a memory or storage of a computer system.
At step 206, a reference frame is selected from the cine MRI sequence. According to an advantageous implementation, the cine frame that is most similar to the DE-MRI image is selected as the reference frame. If available, a trigger time associated with each cine image may image may be used to select the cine frame at the closest cardiac phase to match the DE-MRI image. For example, the trigger times associated with cine MRI sequence may be stored in a database with the cine MRI sequence. For a cine sequence where trigger time is not recorded, the cross-correlation (CC) is calculated between every cine frame and the DE-MRI image, and the cine frame with the largest CC value is selected as the reference frame.
At step 208, deformation fields within the cine MRI sequence are calculated to register the frames of the cine MRI sequence to the reference frame. In order to propagate the suspicious infarction in the DE-MRI image from the reference frame to all other cine frames, the deformation between each cine frame and the reference frame may be estimated using a fast variational non-rigid registration algorithm. This approach can be considered as an extension of a classic optical flow method. In this framework, a dense deformation field is estimated as the solution to a calculus of variation problem, which is solved by performing a compositional update step corresponding to a transport equation. The regularization is added by low-pass filtering the gradient images which are in turn used as velocity field to drive the transport equation. To speedup the convergence and avoid local minima, a multi-scale image pyramid may be created. The local cross correlation can be used as the image similarity measure, as its explicit derivative can be more efficiently calculated than mutual information and it is still general enough to cope with intensity fluctuation and imaging noise between two adjacent perfusion frames.
Registration of time series such as MR cine is typically performed by selecting a reference phase to which all other phases are registered. This approach is not sufficient to propagate the DE-MRI image and/or the infarction zone, which represented as a contoured region in the DE-MRI image, throughout the cardiac phases. Specifically, deformation fields pointing to the reference phase are required to warp the DE-MRI image while the inverse deformations pointing from reference phase to other frames are needed to warp the infarction contours. Accordingly the above-mentioned registration algorithm is extended to estimate inverse consistent deformation fields.
A deformation field Φpq is inverse consistent if Φpq·Φpq−1=I and Φpq−1=Φqp·Φpq is calculated by minimizing the inverse consistent similarity metric:
JicCC=JCC(fp,fq,Φpq)+JCC(fq,fp,Φqp) (1)
Here JCC is the local cross-correlation. fp and fq are two cine phases (frames). The deformation between fp and fq is Φpq:2→2.
An efficient update scheme of iterative gradient descent can be used in order to minimize the inverse consistent similarity in a reasonable time. In particular, each deformation field is alternately updated during descending the gradient of the similarity measure resulting in an accurate computation of the inverse deformation and a quasi-symmetric registration algorithm. The achieved inverse consistency of the deformation fields not only allows for propagating both images and contours between any two cardiac phases, but may also leads to more accurate quasi-symmetric image registration.
At step 210, the DE-MRI image is registered to the reference cine frame. The variational deformable registration method described above in connection with step 208 is robust for cine images, as each adjacent image pair shows similar image content and contrast. Unfortunately, it is less suitable to register the DE-MRI image to the cine reference frame, as the DE-MRI image often presents a strongly enhanced infarction zone which bears no contrast in the cine series. As a result, the pixel-wise variational registration tends to generate unrealistic large deformation which degrades the image quality of warped DE-MRI images even with aggressive regularization.
According to an advantageous embodiment of the present invention, in order to cope with inconsistent visibility between the DE-MRI and cine images and produce robust registration, a hybrid registration algorithm, which unifies intensity-based and point-based similarity into one cost function, may be used for registering the DE-MRI image to the reference cine frame. This cost function contains two terms: a feature point matching term and an intensity matching term. The point matching term is robust against contrast changes and occlusions between DE-MRI and the reference cine. The intensity term enforces the alignment of the myocardium with normal contrast uptake, playing a role of global regularization. The underlying deformation can be modeled as a Free-from deformation (FFD), which is a piece-wise cubic polynomial. Compared to pixel-wise variational registration, FFD is more robust against image content changes.
FFD can be manipulated by a regular control grid with spacing sx×sy for a 2D image. FFD is computationally efficient, because the deformation at any point is only influenced by that point's surrounding 4×4 control points. For a point p with coordinates (x, y), it is assumed that its 4×4 control points are pi.j, i, j=0, . . . , 3. di.j denotes the displacement vector associated with the control point pi.j and the interpolation at point p is defined as:
where u=x/sx−└x/sx┘, v=y/sy−└y/sy┘, and Bi is the i-th basis function of B-splines.
Given reference image R(pi), i=1, . . . , N (e.g., the reference cine frame) and its feature point set {sj}j=1M, and floating image F(pi) (e.g., the DE-MRI image) and its feature point set {tj}j=1M, the images can be registered by solving the following minimization problem:
where the first term of the cost function to be minimized is the point matching term and the second term is the intensity matching term. R is the reference image (reference cine frame) and F is the floating image (DE-MRI image).
Returning to
According to an embodiment of the present invention, in order to better present propagated infarction information from the DE-MRI image, three propagation schemes can be implemented: whole DE-MRI image propagation, infarction contour propagation, and region-of-interest (ROI) propagation.
Returning to
Once the infarction information is propagated using the method of
To quantify the change potentially caused by the suspicious infarction, (Ap−A0)/A0 is used to represent the relative area change and (Tp−T0)/T0, basically the segment strain ratio, is used to represent the relative thickness change. The mean and variance of 6 cases are listed in Table 2.
TABLE 2
Area/Thickness change %.
Cases
1
2
3
4
5
6
ACI
4.5 ± 0.1
4.5 ± 0.2
8.4 ± 0.4
9.7 ± 1.1
3.1 ± 0.1
6.3 ± 0.2
ACN
13.1 ± 0.7
4.6 ± 0.2
6.7 ± 0.3
2.5 ± 0.0
10.6 ± 1.1
8.0 ± 0.2
TCI
2.7 ± 0.1
3.8 ± 0.1
5.9 ± 0.3
7.2 ± 0.3
3.7 ± 0.1
5.3 ± 0.2
TCN
23.5 ± 5.1
19.9 ± 4.9
15.5 ± 2.6
7.6 ± 0.7
20.0 ± 3.1
14.6 ± 1.1
ACI: Area Change of Infarction zone.
ACN: Area Change of Normal myocardium.
TCI: Thickness Change of Infarction zone.
TCN: Thickness Change of Normal myocardium.
Cases 1 and 5 show a noticeable decrease of both area and thickness changes for the infarction, while thickness dropped more in cases 2, 3 and 6. Interestingly, case 4 shows the contrary that relative area change increases for the infarction, although the registration and propagation performed well, which was verified by visual reading. These experiments reveal the feasibility of joint DE-MRI and cine assessment.
The above-described methods for propagation of infarction information from a DE-MRI image based on a cine MRI sequence may be implemented on a computer using well-known computer processors, memory units, storage devices, computer software, and other components. A high level block diagram of such a computer is illustrated in
The foregoing Detailed Description is to be understood as being in every respect illustrative and exemplary, but not restrictive, and the scope of the invention disclosed herein is not to be determined from the Detailed Description, but rather from the claims as interpreted according to the full breadth permitted by the patent laws. It is to be understood that the embodiments shown and described herein are only illustrative of the principles of the present invention and that various modifications may be implemented by those skilled in the art without departing from the scope and spirit of the invention. Those skilled in the art could implement various other feature combinations without departing from the scope and spirit of the invention.
Jolly, Marie-Pierre, Gühring, Jens, Xue, Hui, Guetter, Christoph, Liu, Yixun
Patent | Priority | Assignee | Title |
10025927, | Mar 13 2013 | Musarubra US LLC | Malicious content analysis with multi-version application support within single operating environment |
10027689, | Sep 29 2014 | Musarubra US LLC | Interactive infection visualization for improved exploit detection and signature generation for malware and malware families |
10027690, | Apr 01 2004 | Musarubra US LLC | Electronic message analysis for malware detection |
10027696, | Aug 22 2014 | Musarubra US LLC | System and method for determining a threat based on correlation of indicators of compromise from other sources |
10033747, | Sep 29 2015 | Musarubra US LLC | System and method for detecting interpreter-based exploit attacks |
10050998, | Dec 30 2015 | Musarubra US LLC | Malicious message analysis system |
10068091, | Apr 01 2004 | Musarubra US LLC | System and method for malware containment |
10075455, | Dec 26 2014 | Musarubra US LLC | Zero-day rotating guest image profile |
10084813, | Jun 24 2014 | Musarubra US LLC | Intrusion prevention and remedy system |
10097573, | Apr 01 2004 | Musarubra US LLC | Systems and methods for malware defense |
10122746, | Mar 14 2013 | Musarubra US LLC | Correlation and consolidation of analytic data for holistic view of malware attack |
10133863, | Jun 24 2013 | Musarubra US LLC | Zero-day discovery system |
10133866, | Dec 30 2015 | Musarubra US LLC | System and method for triggering analysis of an object for malware in response to modification of that object |
10148693, | Mar 25 2015 | Musarubra US LLC | Exploit detection system |
10165000, | Apr 01 2004 | Musarubra US LLC | Systems and methods for malware attack prevention by intercepting flows of information |
10169585, | Jun 22 2016 | Musarubra US LLC | System and methods for advanced malware detection through placement of transition events |
10176321, | Dec 11 2015 | Musarubra US LLC | Leveraging behavior-based rules for malware family classification |
10198574, | Mar 13 2013 | Musarubra US LLC | System and method for analysis of a memory dump associated with a potentially malicious content suspect |
10200384, | Mar 14 2013 | Musarubra US LLC | Distributed systems and methods for automatically detecting unknown bots and botnets |
10210329, | Sep 30 2015 | Musarubra US LLC | Method to detect application execution hijacking using memory protection |
10218740, | Sep 30 2013 | Musarubra US LLC | Fuzzy hash of behavioral results |
10242185, | Mar 21 2014 | Musarubra US LLC | Dynamic guest image creation and rollback |
10268918, | Nov 20 2014 | Canon Kabushiki Kaisha | Image processing apparatus and method for calculating image deformation between images |
10284574, | Apr 01 2004 | Musarubra US LLC | System and method for threat detection and identification |
10284575, | Nov 10 2015 | Musarubra US LLC | Launcher for setting analysis environment variations for malware detection |
10296437, | Feb 23 2013 | Musarubra US LLC | Framework for efficient security coverage of mobile software applications |
10341363, | Mar 31 2014 | Musarubra US LLC | Dynamically remote tuning of a malware content detection system |
10341365, | Dec 30 2015 | Musarubra US LLC | Methods and system for hiding transition events for malware detection |
10366231, | Dec 22 2014 | Musarubra US LLC | Framework for classifying an object as malicious with machine learning for deploying updated predictive models |
10404725, | Aug 22 2014 | Musarubra US LLC | System and method of detecting delivery of malware using cross-customer data |
10417031, | Mar 31 2015 | Musarubra US LLC | Selective virtualization for security threat detection |
10432649, | Mar 20 2014 | Musarubra US LLC | System and method for classifying an object based on an aggregated behavior results |
10445502, | Dec 31 2015 | Musarubra US LLC | Susceptible environment detection system |
10447728, | Dec 10 2015 | Musarubra US LLC | Technique for protecting guest processes using a layered virtualization architecture |
10454950, | Jun 30 2015 | Musarubra US LLC | Centralized aggregation technique for detecting lateral movement of stealthy cyber-attacks |
10454953, | Mar 28 2014 | Musarubra US LLC | System and method for separated packet processing and static analysis |
10462173, | Jun 30 2016 | Musarubra US LLC | Malware detection verification and enhancement by coordinating endpoint and malware detection systems |
10467411, | Dec 26 2013 | Musarubra US LLC | System and method for generating a malware identifier |
10469512, | May 10 2013 | Musarubra US LLC | Optimized resource allocation for virtual machines within a malware content detection system |
10474813, | Mar 31 2015 | Musarubra US LLC | Code injection technique for remediation at an endpoint of a network |
10476906, | Mar 25 2016 | Musarubra US LLC | System and method for managing formation and modification of a cluster within a malware detection system |
10476909, | Dec 26 2013 | Musarubra US LLC | System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits |
10491627, | Sep 29 2016 | Musarubra US LLC | Advanced malware detection using similarity analysis |
10503904, | Jun 29 2017 | Musarubra US LLC | Ransomware detection and mitigation |
10505956, | Jul 18 2013 | Musarubra US LLC | System and method for detecting malicious links in electronic messages |
10511614, | Apr 01 2004 | Musarubra US LLC | Subscription based malware detection under management system control |
10515214, | Sep 30 2013 | Musarubra US LLC | System and method for classifying malware within content created during analysis of a specimen |
10523609, | Dec 27 2016 | Musarubra US LLC | Multi-vector malware detection and analysis |
10528726, | Dec 29 2014 | Musarubra US LLC | Microvisor-based malware detection appliance architecture |
10534906, | Feb 05 2014 | Musarubra US LLC | Detection efficacy of virtual machine-based analysis with application specific events |
10552610, | Dec 22 2016 | Musarubra US LLC | Adaptive virtual machine snapshot update framework for malware behavioral analysis |
10554507, | Mar 30 2017 | Musarubra US LLC | Multi-level control for enhanced resource and object evaluation management of malware detection system |
10565378, | Dec 30 2015 | Musarubra US LLC | Exploit of privilege detection framework |
10567405, | Apr 01 2004 | Musarubra US LLC | System for detecting a presence of malware from behavioral analysis |
10572665, | Dec 28 2012 | Musarubra US LLC | System and method to create a number of breakpoints in a virtual machine via virtual machine trapping events |
10581874, | Dec 31 2015 | Musarubra US LLC | Malware detection system with contextual analysis |
10581879, | Dec 22 2016 | Musarubra US LLC | Enhanced malware detection for generated objects |
10581898, | Dec 30 2015 | Musarubra US LLC | Malicious message analysis system |
10587636, | Apr 01 2004 | Musarubra US LLC | System and method for bot detection |
10587647, | Nov 22 2016 | Musarubra US LLC | Technique for malware detection capability comparison of network security devices |
10592678, | Sep 09 2016 | Musarubra US LLC | Secure communications between peers using a verified virtual trusted platform module |
10601848, | Jun 29 2017 | Musarubra US LLC | Cyber-security system and method for weak indicator detection and correlation to generate strong indicators |
10601863, | Mar 25 2016 | Musarubra US LLC | System and method for managing sensor enrollment |
10601865, | Sep 30 2015 | Musarubra US LLC | Detection of credential spearphishing attacks using email analysis |
10616266, | Mar 25 2016 | Musarubra US LLC | Distributed malware detection system and submission workflow thereof |
10621338, | Dec 30 2015 | Musarubra US LLC | Method to detect forgery and exploits using last branch recording registers |
10623434, | Apr 01 2004 | Musarubra US LLC | System and method for virtual analysis of network data |
10637880, | May 15 2013 | Musarubra US LLC | Classifying sets of malicious indicators for detecting command and control communications associated with malware |
10642753, | Jun 30 2015 | Musarubra US LLC | System and method for protecting a software component running in virtual machine using a virtualization layer |
10657251, | Sep 30 2013 | Musarubra US LLC | Multistage system and method for analyzing obfuscated content for malware |
10666686, | Mar 25 2015 | Musarubra US LLC | Virtualized exploit detection system |
10671721, | Mar 25 2016 | Musarubra US LLC | Timeout management services |
10671726, | Sep 22 2014 | Musarubra US LLC | System and method for malware analysis using thread-level event monitoring |
10673867, | Mar 30 2017 | FireEye, Inc.; FIREEYE, INC | System and method for enforcing compliance with subscription requirements for cyber-attack detection service |
10701091, | Mar 15 2013 | Musarubra US LLC | System and method for verifying a cyberthreat |
10706149, | Sep 30 2015 | Musarubra US LLC | Detecting delayed activation malware using a primary controller and plural time controllers |
10713358, | Mar 15 2013 | GOOGLE LLC | System and method to extract and utilize disassembly features to classify software intent |
10713362, | Sep 30 2013 | Musarubra US LLC | Dynamically adaptive framework and method for classifying malware using intelligent static, emulation, and dynamic analyses |
10715542, | Aug 14 2015 | Musarubra US LLC | Mobile application risk analysis |
10726127, | Jun 30 2015 | Musarubra US LLC | System and method for protecting a software component running in a virtual machine through virtual interrupts by the virtualization layer |
10728263, | Apr 13 2015 | Musarubra US LLC | Analytic-based security monitoring system and method |
10735458, | Sep 30 2013 | Musarubra US LLC | Detection center to detect targeted malware |
10740456, | Jan 16 2014 | Musarubra US LLC | Threat-aware architecture |
10747872, | Sep 27 2017 | Musarubra US LLC | System and method for preventing malware evasion |
10757120, | Apr 01 2004 | Musarubra US LLC | Malicious network content detection |
10757134, | Jun 24 2014 | Musarubra US LLC | System and method for detecting and remediating a cybersecurity attack |
10785255, | Mar 25 2016 | Musarubra US LLC | Cluster configuration within a scalable malware detection system |
10791138, | Mar 30 2017 | Musarubra US LLC | Subscription-based malware detection |
10795991, | Nov 08 2016 | Musarubra US LLC | Enterprise search |
10798112, | Mar 30 2017 | Musarubra US LLC | Attribute-controlled malware detection |
10798121, | Dec 30 2014 | Musarubra US LLC | Intelligent context aware user interaction for malware detection |
10805340, | Jun 26 2014 | Musarubra US LLC | Infection vector and malware tracking with an interactive user display |
10805346, | Oct 01 2017 | Musarubra US LLC | Phishing attack detection |
10812513, | Mar 14 2013 | Musarubra US LLC | Correlation and consolidation holistic views of analytic data pertaining to a malware attack |
10817606, | Sep 30 2015 | Musarubra US LLC | Detecting delayed activation malware using a run-time monitoring agent and time-dilation logic |
10826931, | Mar 29 2018 | Musarubra US LLC | System and method for predicting and mitigating cybersecurity system misconfigurations |
10834107, | Nov 10 2015 | Musarubra US LLC | Launcher for setting analysis environment variations for malware detection |
10846117, | Dec 10 2015 | Musarubra US LLC | Technique for establishing secure communication between host and guest processes of a virtualization architecture |
10848397, | Mar 30 2017 | Musarubra US LLC | System and method for enforcing compliance with subscription requirements for cyber-attack detection service |
10848521, | Mar 13 2013 | Musarubra US LLC | Malicious content analysis using simulated user interaction without user involvement |
10855700, | Jun 29 2017 | Musarubra US LLC | Post-intrusion detection of cyber-attacks during lateral movement within networks |
10868818, | Sep 29 2014 | Musarubra US LLC | Systems and methods for generation of signature generation using interactive infection visualizations |
10872151, | Dec 30 2015 | Musarubra US LLC | System and method for triggering analysis of an object for malware in response to modification of that object |
10873597, | Sep 30 2015 | Musarubra US LLC | Cyber attack early warning system |
10887328, | Sep 29 2015 | Musarubra US LLC | System and method for detecting interpreter-based exploit attacks |
10893059, | Mar 31 2016 | Musarubra US LLC | Verification and enhancement using detection systems located at the network periphery and endpoint devices |
10893068, | Jun 30 2017 | Musarubra US LLC | Ransomware file modification prevention technique |
10902117, | Dec 22 2014 | Musarubra US LLC | Framework for classifying an object as malicious with machine learning for deploying updated predictive models |
10902119, | Mar 30 2017 | Musarubra US LLC | Data extraction system for malware analysis |
10904286, | Mar 24 2017 | Musarubra US LLC | Detection of phishing attacks using similarity analysis |
10929266, | Feb 23 2013 | Musarubra US LLC | Real-time visual playback with synchronous textual analysis log display and event/time indexing |
10956477, | Mar 30 2018 | GOOGLE LLC | System and method for detecting malicious scripts through natural language processing modeling |
11003773, | Mar 30 2018 | Musarubra US LLC | System and method for automatically generating malware detection rule recommendations |
11005860, | Dec 28 2017 | GOOGLE LLC | Method and system for efficient cybersecurity analysis of endpoint events |
11068587, | Mar 21 2014 | Musarubra US LLC | Dynamic guest image creation and rollback |
11075930, | Jun 27 2018 | Musarubra US LLC | System and method for detecting repetitive cybersecurity attacks constituting an email campaign |
11075945, | Sep 30 2013 | Musarubra US LLC | System, apparatus and method for reconfiguring virtual machines |
11082435, | Apr 01 2004 | Musarubra US LLC | System and method for threat detection and identification |
11082436, | Mar 28 2014 | Musarubra US LLC | System and method for offloading packet processing and static analysis operations |
11089057, | Dec 26 2013 | Musarubra US LLC | System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits |
11108809, | Oct 27 2017 | GOOGLE LLC | System and method for analyzing binary code for malware classification using artificial neural network techniques |
11113086, | Jun 30 2015 | Musarubra US LLC | Virtual system and method for securing external network connectivity |
11153341, | Apr 01 2004 | Musarubra US LLC | System and method for detecting malicious network content using virtual environment components |
11182473, | Sep 13 2018 | Musarubra US LLC | System and method for mitigating cyberattacks against processor operability by a guest process |
11200080, | Dec 11 2015 | Musarubra US LLC | Late load technique for deploying a virtualization layer underneath a running operating system |
11210390, | Mar 13 2013 | Musarubra US LLC | Multi-version application support and registration within a single operating system environment |
11228491, | Jun 28 2018 | Musarubra US LLC | System and method for distributed cluster configuration monitoring and management |
11240262, | Jun 30 2016 | Musarubra US LLC | Malware detection verification and enhancement by coordinating endpoint and malware detection systems |
11240275, | Dec 28 2017 | Musarubra US LLC | Platform and method for performing cybersecurity analyses employing an intelligence hub with a modular architecture |
11244044, | Sep 30 2015 | Musarubra US LLC | Method to detect application execution hijacking using memory protection |
11244056, | Jul 01 2014 | Musarubra US LLC | Verification of trusted threat-aware visualization layer |
11258806, | Jun 24 2019 | GOOGLE LLC | System and method for automatically associating cybersecurity intelligence to cyberthreat actors |
11271955, | Dec 28 2017 | Musarubra US LLC | Platform and method for retroactive reclassification employing a cybersecurity-based global data store |
11294705, | Mar 31 2015 | Musarubra US LLC | Selective virtualization for security threat detection |
11297074, | Mar 31 2014 | Musarubra US LLC | Dynamically remote tuning of a malware content detection system |
11314859, | Jun 27 2018 | Musarubra US LLC | Cyber-security system and method for detecting escalation of privileges within an access token |
11316900, | Jun 29 2018 | Musarubra US LLC | System and method for automatically prioritizing rules for cyber-threat detection and mitigation |
11368475, | Dec 21 2018 | Musarubra US LLC | System and method for scanning remote services to locate stored objects with malware |
11381578, | Jan 13 2012 | Musarubra US LLC | Network-based binary file extraction and analysis for malware detection |
11392700, | Jun 28 2019 | Musarubra US LLC | System and method for supporting cross-platform data verification |
11399040, | Mar 30 2017 | Musarubra US LLC | Subscription-based malware detection |
11552986, | Dec 31 2015 | Musarubra US LLC | Cyber-security framework for application of virtual features |
11556640, | Jun 27 2019 | GOOGLE LLC | Systems and methods for automated cybersecurity analysis of extracted binary string sets |
11558401, | Mar 30 2018 | Musarubra US LLC | Multi-vector malware detection data sharing system for improved detection |
11570211, | Mar 24 2017 | Musarubra US LLC | Detection of phishing attacks using similarity analysis |
11632392, | Mar 25 2016 | Musarubra US LLC | Distributed malware detection system and submission workflow thereof |
11637857, | Apr 01 2004 | Musarubra US LLC | System and method for detecting malicious traffic using a virtual machine configured with a select software environment |
11637859, | Oct 27 2017 | GOOGLE LLC | System and method for analyzing binary code for malware classification using artificial neural network techniques |
11637862, | Sep 30 2019 | GOOGLE LLC | System and method for surfacing cyber-security threats with a self-learning recommendation engine |
11763004, | Sep 27 2018 | Musarubra US LLC | System and method for bootkit detection |
11856011, | Mar 30 2018 | Musarubra US LLC | Multi-vector malware detection data sharing system for improved detection |
11863581, | Mar 30 2017 | Musarubra US LLC | Subscription-based malware detection |
11868795, | Mar 31 2015 | Musarubra US LLC | Selective virtualization for security threat detection |
11882140, | Jun 27 2018 | Musarubra US LLC | System and method for detecting repetitive cybersecurity attacks constituting an email campaign |
11886585, | Sep 27 2019 | Musarubra US LLC | System and method for identifying and mitigating cyberattacks through malicious position-independent code execution |
11936666, | Mar 31 2016 | Musarubra US LLC | Risk analyzer for ascertaining a risk of harm to a network and generating alerts regarding the ascertained risk |
11949692, | Dec 28 2017 | GOOGLE LLC | Method and system for efficient cybersecurity analysis of endpoint events |
11949698, | Mar 31 2014 | Musarubra US LLC | Dynamically remote tuning of a malware content detection system |
11979428, | Mar 31 2016 | Musarubra US LLC | Technique for verifying exploit/malware at malware detection appliance through correlation with endpoints |
11997111, | Mar 30 2017 | Musarubra US LLC | Attribute-controlled malware detection |
12063229, | Jun 24 2019 | GOOGLE LLC | System and method for associating cybersecurity intelligence to cyberthreat actors through a similarity matrix |
12069087, | Oct 27 2017 | GOOGLE LLC | System and method for analyzing binary code for malware classification using artificial neural network techniques |
12074887, | Dec 21 2018 | Musarubra US LLC | System and method for selectively processing content after identification and removal of malicious content |
9159035, | Feb 23 2013 | Musarubra US LLC | Framework for computer application analysis of sensitive information tracking |
9176843, | Feb 23 2013 | Musarubra US LLC | Framework for efficient security coverage of mobile software applications |
9223972, | Mar 31 2014 | Musarubra US LLC | Dynamically remote tuning of a malware content detection system |
9225740, | Feb 23 2013 | Musarubra US LLC | Framework for iterative analysis of mobile software applications |
9262635, | Feb 05 2014 | Musarubra US LLC | Detection efficacy of virtual machine-based analysis with application specific events |
9282109, | Apr 01 2004 | Musarubra US LLC | System and method for analyzing packets |
9294501, | Sep 30 2013 | Musarubra US LLC | Fuzzy hash of behavioral results |
9300686, | Jun 28 2013 | Musarubra US LLC | System and method for detecting malicious links in electronic messages |
9306960, | Apr 01 2004 | Musarubra US LLC | Systems and methods for unauthorized activity defense |
9306974, | Dec 26 2013 | Musarubra US LLC | System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits |
9311479, | Mar 14 2013 | Musarubra US LLC | Correlation and consolidation of analytic data for holistic view of a malware attack |
9355247, | Mar 13 2013 | Musarubra US LLC | File extraction from memory dump for malicious content analysis |
9363280, | Aug 22 2014 | Musarubra US LLC | System and method of detecting delivery of malware using cross-customer data |
9367681, | Feb 23 2013 | Musarubra US LLC | Framework for efficient security coverage of mobile software applications using symbolic execution to reach regions of interest within an application |
9398028, | Jun 26 2014 | Musarubra US LLC | System, device and method for detecting a malicious attack based on communcations between remotely hosted virtual machines and malicious web servers |
9430646, | Mar 14 2013 | Musarubra US LLC | Distributed systems and methods for automatically detecting unknown bots and botnets |
9432389, | Mar 31 2014 | Musarubra US LLC | System, apparatus and method for detecting a malicious attack based on static analysis of a multi-flow object |
9438613, | Mar 30 2015 | Musarubra US LLC | Dynamic content activation for automated analysis of embedded objects |
9438622, | Nov 03 2008 | Musarubra US LLC | Systems and methods for analyzing malicious PDF network content |
9438623, | Jun 06 2014 | Musarubra US LLC | Computer exploit detection using heap spray pattern matching |
9478013, | Jun 28 2012 | KONINKLIJKE PHILIPS N V | System and method for registering an image sequence |
9483644, | Mar 31 2015 | Musarubra US LLC | Methods for detecting file altering malware in VM based analysis |
9495180, | May 10 2013 | Musarubra US LLC | Optimized resource allocation for virtual machines within a malware content detection system |
9516057, | Apr 01 2004 | Musarubra US LLC | Systems and methods for computer worm defense |
9589135, | Sep 29 2014 | FireEye, Inc. | Exploit detection of malware and malware families |
9591015, | Mar 28 2014 | Musarubra US LLC | System and method for offloading packet processing and static analysis operations |
9591020, | Apr 01 2004 | Musarubra US LLC | System and method for signature generation |
9594904, | Apr 23 2015 | Musarubra US LLC | Detecting malware based on reflection |
9594905, | Feb 23 2013 | Musarubra US LLC | Framework for efficient security coverage of mobile software applications using machine learning |
9594912, | Jun 06 2014 | Musarubra US LLC | Return-oriented programming detection |
9596258, | Sep 30 2013 | FireEye, Inc. | System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection |
9609007, | Aug 22 2014 | Musarubra US LLC | System and method of detecting delivery of malware based on indicators of compromise from different sources |
9626509, | Mar 13 2013 | Musarubra US LLC | Malicious content analysis with multi-version application support within single operating environment |
9628498, | Apr 01 2004 | Musarubra US LLC | System and method for bot detection |
9628507, | Sep 30 2013 | Musarubra US LLC | Advanced persistent threat (APT) detection center |
9641546, | Mar 14 2013 | Musarubra US LLC | Electronic device for aggregation, correlation and consolidation of analysis attributes |
9661009, | Jun 26 2014 | Musarubra US LLC | Network-based malware detection |
9661018, | Apr 01 2004 | Musarubra US LLC | System and method for detecting anomalous behaviors using a virtual machine environment |
9690606, | Mar 25 2015 | Musarubra US LLC | Selective system call monitoring |
9690933, | Dec 22 2014 | Musarubra US LLC | Framework for classifying an object as malicious with machine learning for deploying updated predictive models |
9690936, | Sep 30 2013 | Musarubra US LLC | Multistage system and method for analyzing obfuscated content for malware |
9736179, | Sep 30 2013 | Musarubra US LLC | System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection |
9747446, | Dec 26 2013 | Musarubra US LLC | System and method for run-time object classification |
9756074, | Dec 26 2013 | Musarubra US LLC | System and method for IPS and VM-based detection of suspicious objects |
9773112, | Sep 29 2014 | Musarubra US LLC | Exploit detection of malware and malware families |
9787700, | Mar 28 2014 | Musarubra US LLC | System and method for offloading packet processing and static analysis operations |
9792196, | Feb 23 2013 | Musarubra US LLC | Framework for efficient security coverage of mobile software applications |
9824216, | Dec 31 2015 | Musarubra US LLC | Susceptible environment detection system |
9825976, | Sep 30 2015 | Musarubra US LLC | Detection and classification of exploit kits |
9825989, | Sep 30 2015 | Musarubra US LLC | Cyber attack early warning system |
9832212, | Apr 01 2004 | FireEye, Inc. | Electronic message analysis for malware detection |
9838408, | Jun 26 2014 | Musarubra US LLC | System, device and method for detecting a malicious attack based on direct communications between remotely hosted virtual machines and malicious web servers |
9838411, | Apr 01 2004 | Musarubra US LLC | Subscriber based protection system |
9838416, | Jun 14 2004 | Musarubra US LLC | System and method of detecting malicious content |
9838417, | Dec 30 2014 | Musarubra US LLC | Intelligent context aware user interaction for malware detection |
9846776, | Mar 31 2015 | Musarubra US LLC | System and method for detecting file altering behaviors pertaining to a malicious attack |
9888019, | Jul 18 2013 | Musarubra US LLC | System and method for detecting malicious links in electronic messages |
9910988, | Sep 30 2013 | Musarubra US LLC | Malware analysis in accordance with an analysis plan |
9912684, | Apr 01 2004 | Musarubra US LLC | System and method for virtual analysis of network data |
9912691, | Sep 30 2013 | Musarubra US LLC | Fuzzy hash of behavioral results |
9916440, | Feb 05 2014 | Musarubra US LLC | Detection efficacy of virtual machine-based analysis with application specific events |
9921978, | Nov 08 2013 | Musarubra US LLC | System and method for enhanced security of storage devices |
9954890, | Nov 03 2008 | FireEye, Inc. | Systems and methods for analyzing PDF documents |
9973531, | Jun 06 2014 | Musarubra US LLC | Shellcode detection |
Patent | Priority | Assignee | Title |
6205349, | Sep 29 1998 | Northwestern University | Differentiating normal living myocardial tissue, injured living myocardial tissue, and infarcted myocardial tissue in vivo using magnetic resonance imaging |
7668354, | Mar 23 2005 | Siemens Medical Solutions USA, Inc | System and method for tracking and classifying the left ventricle of the heart using cine-delayed enhancement magnetic resonance |
20090005673, | |||
20090275822, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Nov 15 2011 | Siemens Aktiengesellschaft | (assignment on the face of the patent) | / | |||
Dec 09 2011 | XUE, HUI | Siemens Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 027536 | /0634 | |
Dec 09 2011 | LIU, YIXUN | Siemens Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 027536 | /0652 | |
Dec 13 2011 | JOLLY, MARIE-PIERRE | Siemens Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 027536 | /0634 | |
Dec 14 2011 | GUEHRING, JENS | Siemens Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 027536 | /0652 | |
Dec 15 2011 | GUETTER, CHRISTOPH | Siemens Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 027536 | /0634 | |
Jun 18 2013 | Siemens Corporation | Siemens Aktiengesellschaft | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 030718 | /0171 | |
Jun 10 2016 | Siemens Aktiengesellschaft | Siemens Healthcare GmbH | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 039271 | /0561 | |
Dec 19 2023 | Siemens Healthcare GmbH | SIEMENS HEALTHINEERS AG | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 066088 | /0256 |
Date | Maintenance Fee Events |
Aug 09 2017 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Aug 06 2021 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Date | Maintenance Schedule |
Mar 25 2017 | 4 years fee payment window open |
Sep 25 2017 | 6 months grace period start (w surcharge) |
Mar 25 2018 | patent expiry (for year 4) |
Mar 25 2020 | 2 years to revive unintentionally abandoned end. (for year 4) |
Mar 25 2021 | 8 years fee payment window open |
Sep 25 2021 | 6 months grace period start (w surcharge) |
Mar 25 2022 | patent expiry (for year 8) |
Mar 25 2024 | 2 years to revive unintentionally abandoned end. (for year 8) |
Mar 25 2025 | 12 years fee payment window open |
Sep 25 2025 | 6 months grace period start (w surcharge) |
Mar 25 2026 | patent expiry (for year 12) |
Mar 25 2028 | 2 years to revive unintentionally abandoned end. (for year 12) |